Code Arsenal – Programming Tutorials and Code Samples: C# Read Excel and Show in WPF DataGrid

http://www.codearsenal.net/2012/06/c-sharp-read-excel-and-show-in-wpf.html?m=1

Posted in coding theory

Building an Extensible Application with MEF, WPF, and MVVM – CodeProject

http://www.codeproject.com/Articles/43625/Building-an-Extensible-Application-with-MEF-WPF-an

Posted in coding theory

ASP.NET SPA with openid connect (via AAD)

To make the SPA sample in visual studio 2015 work, with AAD, do something like the following to configure the client: Note the passive setting in the calling code. Note the redirect URI I configured in the AAD record.

app.UseGoogleAuthentication(new GoogleOAuth2AuthenticationOptions()

{

ClientId = “328410290065.apps.googleusercontent.com”,

ClientSecret = “alhNXE31GCwU5BgMDzSB4r0n”

});

app.UseOpenIdConnectAuthentication(new OpenIdConnectAuthenticationOptions

{

AuthenticationMode = Microsoft.Owin.Security.AuthenticationMode.Passive,

Authority = https://login.microsoftonline.com/cincyrapmlsqa.onmicrosoft.com”,

ClientId = “00b85995-e861-40e3-9094-f264a0b58d16”,

ClientSecret = “fkgOn8ven2OqvZMX61KAEjiKSDZyJzEI+w1hxl/mku8=”

});

 

redirectAAD

 

Posted in coding theory

Choosing weighted cards with urn replacement

Re turing and cryptanalzing bigrams in key covers used in layter naval enigma

From web:-

http://stackoverflow.com/questions/352670/weighted-random-selection-with-and-without-replacement

One of the fastest ways to make many with replacement samples from an unchanging list is the alias method. The core intuition is that we can create a set of equal-sized bins for the weighted list that can be indexed very efficiently through bit operations, to avoid a binary search. It will turn out that, done correctly, we will need to only store two items from the original list per bin, and thus can represent the split with a single percentage.

Let’s us take the example of five equally weighted choices, (a:1, b:1, c:1, d:1, e:1)

To create the alias lookup:

Normalize the weights such that they sum to 1.0. (a:0.2 b:0.2 c:0.2 d:0.2 e:0.2) This is the probability of choosing each weight.

Find the smallest power of 2 greater than or equal to the number of variables, and create this number of partitions, |p|. Each partition represents a probability mass of 1/|p|. In this case, we create 8 partitions, each able to contain 0.125.

Take the variable with the least remaining weight, and place as much of it’s mass as possible in an empty partition. In this example, we see that a fills the first partition. (p1{a|null,1.0},p2,p3,p4,p5,p6,p7,p8) with (a:0.075, b:0.2 c:0.2 d:0.2 e:0.2)

If the partition is not filled, take the variable with the most weight, and fill the partition with that variable.

Repeat steps 3 and 4, until none of the weight from the original partition need be assigned to the list.

For example, if we run another iteration of 3 and 4, we see

(p1{a|null,1.0},p2{a|b,0.6},p3,p4,p5,p6,p7,p8) with (a:0, b:0.15 c:0.2 d:0.2 e:0.2) left to be assigned

At runtime:

Get a U(0,1) random number, say binary 0.001100000

bitshift it lg2(p), finding the index partition. Thus, we shift it by 3, yielding 001.1, or position 1, and thus partition 2.

If the partition is split, use the decimal portion of the shifted random number to decide the split. In this case, the value is 0.5, and 0.5 < 0.6, so return a.

Here is some code and another explanation, but unfortunately it doesn't use the bitshifting technique, nor have I actually verified it.

Posted in coding theory

Running a B2C AAD integration (with implicit code flow)

 

sample code

image
https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIdConnect-DotNet

 

code

image

signup

image

claims having created local sesssion

image

 

if we add google as an IDP, we see during signUP

image

image

Posted in AAD

B2C Azure AD

 

lets play with B2c of Azure AD

image

https://azure.microsoft.com/en-us/documentation/articles/active-directory-b2c-devquickstarts-web-dotnet/

The App

image

B2C_1_pwsignup:

image

{
  "issuer": "https://login.microsoftonline.com/8acee302-9d63-4634-800f-73f31f5ef745/v2.0/",
  "authorization_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/authorize?p=b2c_1_pwsignup",
  "token_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/token?p=b2c_1_pwsignup",
  "end_session_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/logout?p=b2c_1_pwsignup",
  "jwks_uri": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/discovery/v2.0/keys?p=b2c_1_pwsignup",
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "response_types_supported": [
    "code",
    "id_token",
    "code id_token"
  ],
  "scopes_supported": [
    "openid"
  ],
  "subject_types_supported": [
    "pairwise"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_post"
  ],
  "claims_supported": [
    "emails",
    "name",
    "sub",
    "idp"
  ]
}

 

pwsignin

image

{
  "issuer": "https://login.microsoftonline.com/8acee302-9d63-4634-800f-73f31f5ef745/v2.0/",
  "authorization_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/authorize?p=b2c_1_pswignin",
  "token_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/token?p=b2c_1_pswignin",
  "end_session_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/logout?p=b2c_1_pswignin",
  "jwks_uri": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/discovery/v2.0/keys?p=b2c_1_pswignin",
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "response_types_supported": [
    "code",
    "id_token",
    "code id_token"
  ],
  "scopes_supported": [
    "openid"
  ],
  "subject_types_supported": [
    "pairwise"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_post"
  ],
  "claims_supported": [
    "emails",
    "name",
    "sub",
    "idp"
  ]
}

 

 

pwprofile

 

image

 

{
  "issuer": "https://login.microsoftonline.com/8acee302-9d63-4634-800f-73f31f5ef745/v2.0/",
  "authorization_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/authorize?p=b2c_1_pwprofile",
  "token_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/token?p=b2c_1_pwprofile",
  "end_session_endpoint": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/oauth2/v2.0/logout?p=b2c_1_pwprofile",
  "jwks_uri": "https://login.microsoftonline.com/b2ctrialpw.onmicrosoft.com/discovery/v2.0/keys?p=b2c_1_pwprofile",
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "response_types_supported": [
    "code",
    "id_token",
    "code id_token"
  ],
  "scopes_supported": [
    "openid"
  ],
  "subject_types_supported": [
    "pairwise"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_post"
  ],
  "claims_supported": [
    "sub",
    "idp"
  ]
}
Posted in AAD

Flying randomness

Been rereading like math papers on saving rand bits (using expander network’s).

So if spook a fly does it fly off in a random direction?

Posted in coding theory

owin.security.providers for AAD

here are the changes I made to the github provider … to make it talk instead to Azure’s AAD (in non-managed IDP mode).

 

image

image

image

yes .. it uses the code from /auth twice, once to get a non-standard access token (that access the “standard” openid userinfo resource) and twice to get a JWT (the id token) suited for access the JWT-powered graphAPI of AAD.

Go figure this American mess.

Posted in AAD

clear coding

http://www.telecom.tuc.gr/Greek/Liavas/Seminars/coding_theory/Docs/6_Codes_on_Graphs.pdf

Posted in coding theory

wow–a 1c deal saving from groupon

 

 

 

image

Posted in dunno

cortana and MLS search

 

 

image

Posted in cortana

westminster trial

With the javascript universal windows store app that comes with visual studio community, I could follow the instructions as given

image

See http://microsoftedge.github.io/WebAppsDocs/en-US/win10/CreateHWA.htm

Posted in Computers and Internet

bama to john : get the email message out

Hey John, remember when that comedian reduce snowden to a dick pic – and the public got that we spy on everyone, now? Well we need you to do the same, for the Chinese spying on us. We need you to go out and say: they are reading your emails. The public will get the message then. Especially the classified ones.

Its all synced up with Hilary, and her email “manufactured scandal”. Its wrong for her to received emails from others who have mentioned classified info. But, its fine for you to know that the chinese read your emails, with classified material.

We need a quick win to help out whathisname in the UK, as they ramp up their snooper’s charter (in secret, this time). Tony in Koala-land is all on board, too.

Posted in dunno

tunny cryptanalysis before the machine age

We learn that depths provided sufficient evidence to figure the chi and psi wheel patterns – which were changing quarterly or monthly, only. And , we know that before the machine age of GCCS really got going that this change pattern was amenable to hand methods of cryptanalysis.

image

image

http://www.alanturing.net/turing_archive/archive/t/t16/TR16-024.html

We also learn that the machine wheel was viewed, in the original design concept, as the daily wheel (to be changed much as in the enigma world). What is interesting is the reference to cribs, as a valid means to assist with wheel breaking (assuming that countermeasures didn’t make crib matching too hard).

fascinating to see related the chain of assumptions and deductions – that would reveal a crypto tell.

image

http://www.alanturing.net/turing_archive/archive/t/t16/TR16-025.html

Posted in colossus, crypto

colossus era cryptanalysis and cray CPUs

it was fun re-reading the general report on tunny – a couple of years after I first encountered its strange language and before I learned the core math it leverages – as taught today using our language game.

We are used, today, when decoding or error-correcting to using iterative message-passing algorithms. That is, given a parity matrix that specifies a state machine (with edges and nodes), pass beliefs (about code-breaking-related “propositions”) along the edges to act as a custom computing machine. In the case of tunny break, log-likelihoods were passed (much as today), with a particular computation of the inner product between the evolving wheel bits and their evidence valuations and each row of the “parity matrix” – which in colossus days is of course the sample of depths as 1271 spacing of the cipher tape.

What is interesting next is the architecture not only of the Manchester computer – which followed colossus – but also machines as recent as NSA’s cray computers (with custom CPUs). They of course have “secret” instructions – that compute scalar products (i.e. geometric vector angular distances, applying such as the tunny-era masks for doubting bits).

So, given that “secretly-specialized” but otherwise (fast and) general purpose CPUs have gone out of fashion when designing cryptanalytical machines, we have to really go look at the graphics processors of the 80s to see how, back then, cryptanalytical hardware was proceeding. One has to look at how the hardware pipelines supported conformal projections and calculations of complex function vector spaces – to glimpse at what the cryptanalytical capability really was – back then. With that done, one can project forward to today, knowing how raw hardware capability has evolved since the first generation of GPUs.

Posted in Computers and Internet

web authentication brokering, adal and the universal platform

image

 

looks good.

Posted in Azure AD

IKey and the UK key wrapping snooping architecture for azure

Today’s a research cloud day, so we get to look at the official support for blog encryption in encryption (along with key storage).

image

The interesting thing is to see just how much uk policy is build into the architecture (nicely arranging that useless UK-brand HSM will be effecting the wrapping operation, with UK snooper  charter access built in as a “underlying capability:’ courtesy of Microsoft azure no doubt).

Posted in azure

github “deploy” keys

The unity project build server (in their cloud service) does not appear to use OAUITH to talk to the API of the github repository. It seems to requires than one manually install SSH keys instead, as generated by unity (which does the pulling of the repo code)

image

I’m just guessing, but we install the SSH key from the unity site as a “deploy” key in the github repository.

image

This is rather different to how the dockerhub consumer bound to the github API.

Posted in build

markdown

Finally, I’ve found something that explains the .md file extension (and the syntax for the markup used for text formatting).

https://guides.github.com/features/mastering-markdown/

Posted in Computers and Internet

Google analytics

since unity cloud build connects to a github repository (that we created) and github settings per repo can connect to google analytics, we setup an analytics account:

 

image

giving

image

image

Eventually we sign away our life to Google (and NSA) and we get

image

 

UA-65697436-1

Posted in Computers and Internet

continuous build practices for deployement

In our docker tools experiments we saw how clearly tied were github and dockerhub. The latter orchestrates the building of a docker image and the updating of the repository. The former is a repository for the “source”” code of the image build process, issuing an event to dockerhub when a change was performed (that implies the need for a new build). Between the two, an OAUTH connect enables dockerhub to use the githubAPI, when pulling code and updating activities. We blogged at http://wp.me/p1fcz8-5TC .

Now lets take this a step further and ask how well such as github are supporting code builds (vs assembly builds).

For no particular reason, we install unity – a source code and project maintenance system that has little or nothing to do with our normal work. But, it does have its own cloud build service and integration with visual studio. So how do all the cloud, and source repo, and IDE tools all cooperate?

image

image

image

image

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/5xBob4orOMyNkFIftY5SCoG86bUOkN99pnGVI80tEZW5jwU82VBUvMLjiLXLMpfNqLyPE2Mou/U3tayQxSXqY55aHeVwYs9Z0+l2O9dMcIjz9OJCuO0MXgtYCXoIxQDojfO2MZNqCtPZ0Tuce+YtsgrHar1qcVFQoank/EZlJODlCRxMLYFeE9NBUvKd4BrODnBWFasFuRcEkDz88oBJZ0UL9E74FdMOsihD2oom1oHlmucWtn0XBf842DO79cN3saPh0Lq62CYQywpQZOUX6CSLK/ZJ1OpT3VAD5vWU+dBAnp4A16qsJYRIj4dWyLH2+wQnsH56suFsSYjWfJ+F

 

image

image

image

not having created a real project, our build fails:

image

Posted in build

API Sandbox

https://apisandbox.msdn.microsoft.com/

Posted in coding theory

trying out azure AAD to AWS (via saml)

When we logon to myapps (in a chrome private web session)

image

using amazon SP connection (which self-issues a SAML request to the microsoftonline gateway):

image

we try to fix it by assigning a cert to the SP connection:

image

and update the idp metadata in the SP:

image

major problems assigning the per-RP signing cert. Doesn’t seem to work (or at least the wizard doesn’t seem to work..)

Posted in docker

asp.net site in asp.net docker container

 

 

image

http://blogs.msdn.com/b/webdev/archive/2015/01/14/running-asp-net-5-applications-in-linux-containers-with-docker.aspx

 

once the container is partly built (from baseline images), of course the asp.net image itself builds (the project), which involves using the docker/linux version of nuget within the asp.net image to go get all the project’s own dependencies.

image

We can now access our dockerized asp.net app, running on kestrel on linux, executing as a container on the docker host itself operating on ubuntu, in a VM running in azure VM fabric.

image

Posted in docker

AWS to SAML-P IDP hosted by Azure AD

First, we configure the IDP Connection (in which AWS logically points at the IDP endpoints, learned from IDP metadata) – recalling the AWS gotchas.

image

image

Provider ARN

arn:aws:iam::385727861301:saml-provider/PPE

Provider Type

SAML

Creation Time

2015-07-20 15:13 PDT

Then we configure the SP/SP adaptor (in Ping parlance) that is a part of AWS “role” setup, per the instructions at https://msdn.microsoft.com/en-us/library/azure/dn706228.aspx

image

Attribute

SAML:aud

Value

https://signin.aws.amazon.com/saml

Looking at the SP connection (to AWS) in the AAD setup manager, we see for connection attributes:

image

Per the tutorial we add role and mail attribute name/values:

https://aws.amazon.com/SAML/Attributes/Role : arn:aws:iam::385727861301:saml-provider/PPE

https://aws.amazon.com/SAML/Attributes/RoleSessionName: mail

image

Turning now to the main parameters of the AAD-side SP connection:

image

image

using the signup wizard

image

When we try the initiating URI

GET https://myapps.microsoft.com/signin/Amazon%20Web%20Services%20(AWS)/8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

we see a redirect to 

GET https://account.activedirectory.windowsazure.com/applications/signin/Amazon%20Web%20Services%20(AWS)/8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

 

followed by an openid handshake (somewhat surprisingly):

 

GET https://login.microsoftonline.com/common/oauth2/authorize?client_id=0000000c-0000-0000-c000-000000000000&redirect_uri=https%3A%2F%2Faccount.activedirectory.windowsazure.com%2F&response_mode=form_post&response_type=code%20id_token&scope=openid%20profile&state=OpenIdConnect.AuthenticationProperties%3D5AXRYHTy6jr_jeBhxOx1ci8tTEwmvkIqz_Z_qgR0Wd0kDa8J_Ah_1ghY2E3o3B72cF9Hx97h1pZgthNE_ouDhLKv2X1tG5rT8iQ3oGbNuEPayPfZGuBN2BjkRdk5K8VmvG1p27kiaewyGXk3-5K7zM99ZYltTUnOWq1pIBOAzbhMRfyhBryA2hn2v1Eho-enuvYr_npWUPY6F8uyf7-biS0UGqdWeA7LzNwar2ZPPyI6JKbbq9FyHRZ447KbTiJ0JUTAT7mdRl5nFMd1Xuo2p4L2MiDpu8bNk3ldJwOe37D0WmUsIYVw7fT0qnIleFIXwGXaPXSym776o8Hku4tzb1CnNS3upTE8XRjKzxvmuqiNRvBQjElwPgEeX97xeH-L8IPVEE50U-_zhF-ZCJylUg&nonce=1437431812.oLzcSLkq5lOQ8pNnCrboew&nux=1 HTTP/1.1

I’ll guess we are seeing some kind of openid connect to SAML gateway in operation.

we see the live.com IDP assert a code-grant to the gateway:

<html><head><title>Working…</title></head><body><form method=”POST” name=”hiddenform” action=”https://account.activedirectory.windowsazure.com/”><input type=”hidden” name=”code” value=”…” /><input type=”hidden” name=”id_token” value=”…” /><input type=”hidden” name=”state” value=”OpenIdConnect.AuthenticationProperties=5AXRYHTy6jr_jeBhxOx1ci8tTEwmvkIqz_Z_qgR0Wd0kDa8J_Ah_1ghY2E3o3B72cF9Hx97h1pZgthNE_ouDhLKv2X1tG5rT8iQ3oGbNuEPayPfZGuBN2BjkRdk5K8VmvG1p27kiaewyGXk3-5K7zM99ZYltTUnOWq1pIBOAzbhMRfyhBryA2hn2v1Eho-enuvYr_npWUPY6F8uyf7-biS0UGqdWeA7LzNwar2ZPPyI6JKbbq9FyHRZ447KbTiJ0JUTAT7mdRl5nFMd1Xuo2p4L2MiDpu8bNk3ldJwOe37D0WmUsIYVw7fT0qnIleFIXwGXaPXSym776o8Hku4tzb1CnNS3upTE8XRjKzxvmuqiNRvBQjElwPgEeX97xeH-L8IPVEE50U-_zhF-ZCJylUg” /><input type=”hidden” name=”session_state” value=”e2c316b5-e8fe-442c-a7c0-72053483d2f6″ /><noscript><p>Script is disabled. Click Submit to continue.</p><input type=”submit” value=”Submit” /></noscript></form><script language=”javascript”>window.setTimeout(‘document.forms[0].submit()’, 0);</script></body></html>

We then see the second phase of the gateway:

GET https://account.activedirectory.windowsazure.com/applications/redirecttoapplication.aspx?Operation=LinkedSignIn&applicationLinkName=Amazon%20Web%20Services%20(AWS)&applicationId=8b1025e41dd2430ba1502ef79cd700f5 HTTP/1.1

 

When using a live.com account we hit various problems. We get a little when swapping to admin@netmagic.onmicrosoft.com, having declared this user authorized to assert through the SP Connection. we see that out gatewaying process (that now has a user session) can pretend to be the SP and issue a SAML request:

GET https://login.microsoftonline.com/bcbf53cf-af9a-4584-b4c9-6d8b01b3781d/saml2?SAMLRequest=jVHLasMwEPwVo3v8Sh0nwjaYhkIgLSFpe%2BhtLW0agSW5Wjl9fH0dh5ZC6eM6zMzO7BQEuu143fuD2eJTj%2BSDF90aKlnvDLdAirgBjcS94Lv6es3TMOYaPUjwwILVsmRKymwuZot50zR5chGn%2BSKT2EA2nQoBmGYzFtyjI2VNyQb5oCLqcWXIg%2FEDFCfZJM4naXybpjzOeZaHyWL2cOJtgEgdsWR7aAlZUBOh84PTpTXUa3Q7dEcl8G67LtnB%2B454FJF6NMqE8EwhaHizJhRWR6eq7NyOj7V%2F79g5662wLauKMa77z2PgIx6r%2Fg5TRGfjqjivcDPYrZYb2yrxGlxZp8H%2FfC0JkxFRcrIfqRw1qLaW0iHREDr6bvoJft27egc%3D HTTP/1.1

Posted in AAD, Azure AD

docker subscription via azure marketplace

Let’s see what a packaged deployment of docker stuff gives us:

image

http://azure.microsoft.com/en-us/marketplace/partners/docker/docker-subscription-for-azure/

image

Configuring, we tryout the ssh public key method:

image

ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAmOEBYv1j8rU93h1Oj7hG2JfRKXsux503YTZLoq3ZlvkSMjFqzNrifsItldEJlC38nrJeUCrmG4/RQQfYOf+DknPdGia6m55F2CAL7xYbBGz66CB0bJloCmfTELrh7+bCuPVJAbIZ3Q0ovEDIcWVh4RvGqi9s2TUCw4ZTwy2qQoke2L1nVqlaeC5HlzT8rr4Jf8poEdhmn9vRYwSVmh0vuXhVjcnVO8pqk6UwhB2rTAkaJBzzojQTfNd1/BGqUvxfp5gMPCxk/MdTd8SVBuvPNN7csgZBYzJZochXwCFkCMzG1UKObrH8uLlHAixlEiUqsSDmByA2T9JxyqKBvHMjsw== rsa-key-20150720

image

 

due to buy problems, this is as far as I could get, today.

Posted in docker

docker azure cli

 

azure cli in linux-docker-host container:

image

http://azure.microsoft.com/en-gb/documentation/videos/treating-the-azure-cli-as-a-docker-containers-to-speed-development/

Posted in docker

exposing dockerised apache on ubuntu page, from azure

Recall that we are running an ubuntu host in azure vm fabric, with azure extensions for docker.

image

we built an apache-enhanced ubuntu image and launched it on that docker host.

 

###########################################
# Dockerfile to build an apache2 image
###########################################
# Base image is Ubuntu
FROM ubuntu:14.04

# Author: Dr. Peter
MAINTAINER Dr. Peter <peterindia@gmail.com>

# Install apache2 package
RUN apt-get update && \
     apt-get install -y apache2 && \
     apt-get clean

# Set the log directory PATH
ENV APACHE_LOG_DIR /var/log/apache2

# Launch apache2 server in the foreground
ENTRYPOINT [“/usr/sbin/apache2ctl”, “-D”, “FOREGROUND”]

 

To build the image, we use

docker build -t apache2 .

to run the image in a container with exposed endpoints, we use

docker run -d -p 80:80 apache2

To ensure that the container hosts own port 80 is itself exposed as an azure endpoint, we configure azure (to expose the docker hosts port 80..,)

image

 

allowing us to interact with http://pwdocker3.cloudapp.net/ from the public internet:

image

End.

Posted in docker

visual studio online load testing

Using our home_pw@msn.com credential set and licensing, lets do a load test in the cloud.

First we create a load test runner – in the visual studio online environment. This means creating the environment, tied to home_pw@msn.com, and  then configuring visual studio  to bind to it.

image

image

image

Now we follow instructions:

https://code.msdn.microsoft.com/Getting-started-with-17a52e95

Posted in testing

playing with bitbucket

Let’s find out what bitbucket is and to what it integrates.

image

image

image

webhosting – link hosting site to source repo

image

We have basically imported the repo we made earlier in the day on github to bitbucket (once we oauth-authorized bitbucket to make API calls to the github service endpoint)

image

Posted in docker